Vulnerability Description
An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, or man-in-the-middle can send an invalid size for an avatar which will trigger an out-of-bounds read vulnerability. This could result in a denial of service or copy data from memory to the file, resulting in an information leak if the avatar is sent to another user.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pidgin | Pidgin | <= 2.10.12 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2016/dsa-3620Third Party Advisory
- http://www.pidgin.im/news/security/?id=100PatchVendor Advisory
- http://www.securityfocus.com/bid/91335Third Party AdvisoryVDB Entry
- http://www.talosintelligence.com/reports/TALOS-2016-0135/Technical DescriptionThird Party Advisory
- http://www.ubuntu.com/usn/USN-3031-1Third Party Advisory
- https://security.gentoo.org/glsa/201701-38
- http://www.debian.org/security/2016/dsa-3620Third Party Advisory
- http://www.pidgin.im/news/security/?id=100PatchVendor Advisory
- http://www.securityfocus.com/bid/91335Third Party AdvisoryVDB Entry
- http://www.talosintelligence.com/reports/TALOS-2016-0135/Technical DescriptionThird Party Advisory
- http://www.ubuntu.com/usn/USN-3031-1Third Party Advisory
- https://security.gentoo.org/glsa/201701-38
FAQ
What is CVE-2016-2367?
CVE-2016-2367 is a vulnerability with a CVSS score of 5.9 (MEDIUM). An information leak exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT data sent via the server could potentially result in an out-of-bounds read. A malicious user, server, ...
How severe is CVE-2016-2367?
CVE-2016-2367 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-2367?
Check the references section above for vendor advisories and patch information. Affected products include: Pidgin Pidgin, Canonical Ubuntu Linux, Debian Debian Linux.